2024-07-14 02:06:08 +00:00

381 lines
9.4 KiB
JSON

{
"id": "CVE-2005-3120",
"sourceIdentifier": "security@debian.org",
"published": "2005-10-17T20:06:00.000",
"lastModified": "2024-02-02T14:00:54.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
"lastModified": "2007-03-14T00:00:00"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:invisible-island:lynx:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.8.6",
"matchCriteriaId": "678A8E2F-E386-4534-85A0-DEDC96407237"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html",
"source": "security@debian.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17150",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17216",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17230",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17231",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17238",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17248",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17340",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17360",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17444",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17445",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17480",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/18376",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/18584",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/20383",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1015065",
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm",
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-874",
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-876",
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-1085",
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml",
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:186",
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-803.html",
"source": "security@debian.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/419763/100/0/threaded",
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/435689/30/4740/threaded",
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/15117",
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253",
"source": "security@debian.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://usn.ubuntu.com/206-1/",
"source": "security@debian.org",
"tags": [
"Broken Link"
]
}
]
}